Skip to main content
Erschienen in: Soft Computing 7/2012

01.07.2012 | Focus

Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems

verfasst von: Giovanni Acampora

Erschienen in: Soft Computing | Ausgabe 7/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network traffic patterns as either ‘normal’ or ‘abnormal’. Precisely, the main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by detecting malicious network activities such as port scans, denial of service or other attempts to crack computer network environments. Even though the incorporation of conventional Soft Computing techniques in NIDSs has yielded to good solutions, the strong dynamism characterizing network intrusion patterns tend to invalidate the usability of existing framework. To tackle this issue, our proposal performs an adaptive supervised learning on a collection of time series that characterizes the network behavior to create a so-called timed automata-based fuzzy controller (TAFC), i.e. an evolvable fuzzy controller whose dynamic features allow to design an advanced network intrusion detection system able to directly deal with computer network dynamism and support networks’ administrators to prevent eventual damages coming from unauthorized network intrusion. As will be shown in experiments, where our approach has been compared with a conventional Mamdani fuzzy controller, the proposed system reduces the detection error and, as consequence, improves the computer network robustness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Acampora G, Loia V (2005) Fuzzy control interoperability and scalability for adaptive domotic framework. IEEE Trans Ind Inf 1(2):97–111CrossRef Acampora G, Loia V (2005) Fuzzy control interoperability and scalability for adaptive domotic framework. IEEE Trans Ind Inf 1(2):97–111CrossRef
Zurück zum Zitat Acampora G, Loia V (2008) An open integrated environment for transparent fuzzy agents design. Open Source Development, Communities and Quality, IFIP International Federation for Information Processing, vol 275/2008. Springer, Boston, pp 1571–5736 Acampora G, Loia V (2008) An open integrated environment for transparent fuzzy agents design. Open Source Development, Communities and Quality, IFIP International Federation for Information Processing, vol 275/2008. Springer, Boston, pp 1571–5736
Zurück zum Zitat Anderson JP (1980) Computer security threat monitoring and surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania Anderson JP (1980) Computer security threat monitoring and surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania
Zurück zum Zitat Anderson D, Frivold T, Valdes A (1995) Next-generation intrusion-detection expert system (NIDES). Technical report, Computer Science Laboratory, SRI International, Menlo Park Anderson D, Frivold T, Valdes A (1995) Next-generation intrusion-detection expert system (NIDES). Technical report, Computer Science Laboratory, SRI International, Menlo Park
Zurück zum Zitat Bace RG (2000) Intrusion detection. Macmillan Technical Publishing, Indianapolis Bace RG (2000) Intrusion detection. Macmillan Technical Publishing, Indianapolis
Zurück zum Zitat Barbara D, Couto J, Jajodia S, Popyack L, Wu N (2001) ADAM: detecting intrusions by data mining. In: Proceedings of the 2001 IEEE, workshop on information assurance and security, United States Military Academy, West Point Barbara D, Couto J, Jajodia S, Popyack L, Wu N (2001) ADAM: detecting intrusions by data mining. In: Proceedings of the 2001 IEEE, workshop on information assurance and security, United States Military Academy, West Point
Zurück zum Zitat Biswanath M, Todd LH, Karl NL (1994) Network intrusion detection. IEEE Netw 8(3):26–41CrossRef Biswanath M, Todd LH, Karl NL (1994) Network intrusion detection. IEEE Netw 8(3):26–41CrossRef
Zurück zum Zitat Bolzoni D, Etalle S (2008) Approaches in anomaly-based network intrusion Detection systems. In: Intrusion detection systems. Advances in Information Security, vol 38. Springer, London, pp 1–15 Bolzoni D, Etalle S (2008) Approaches in anomaly-based network intrusion Detection systems. In: Intrusion detection systems. Advances in Information Security, vol 38. Springer, London, pp 1–15
Zurück zum Zitat Botha M, Solms R (2003) Utilising fuzzy logic and trend analysis for effective intrusion detection. Comput Secur 22:423–434CrossRef Botha M, Solms R (2003) Utilising fuzzy logic and trend analysis for effective intrusion detection. Comput Secur 22:423–434CrossRef
Zurück zum Zitat Bulatovic D, Velasevic D (1999) A distributed intrusion detection system based on bayesian alarm networks. Lect Notes Comput Sci 1740:219–228CrossRef Bulatovic D, Velasevic D (1999) A distributed intrusion detection system based on bayesian alarm networks. Lect Notes Comput Sci 1740:219–228CrossRef
Zurück zum Zitat Byuhghae-Cha KP, Jaiyttyun S (2005) Neural networks techniques for host anomaly intrusion detection using fixed pattern transformation. In: ICCSA 2005, LNCS, vol 3481, pp 254–263 Byuhghae-Cha KP, Jaiyttyun S (2005) Neural networks techniques for host anomaly intrusion detection using fixed pattern transformation. In: ICCSA 2005, LNCS, vol 3481, pp 254–263
Zurück zum Zitat Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3) Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3)
Zurück zum Zitat Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion-detection systems. Comput Netw 31(8):805–822CrossRef Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion-detection systems. Comput Netw 31(8):805–822CrossRef
Zurück zum Zitat Dickerson JE, Dickerson JA (2000) Fuzzy network profiling for intrusion detection. In: Proceedings of NAFIPS 19th international conference of the North American fuzzy information processing society, Atlanta, pp 301–306 Dickerson JE, Dickerson JA (2000) Fuzzy network profiling for intrusion detection. In: Proceedings of NAFIPS 19th international conference of the North American fuzzy information processing society, Atlanta, pp 301–306
Zurück zum Zitat Dickerson JE, Juslin J, Koukousoula O, Dickerson JA (2001) Fuzzy intrusion detection. In: IFSA world congress and 20th NAFIPS international conference, vol 9. No 3, pp 1506–1510 Dickerson JE, Juslin J, Koukousoula O, Dickerson JA (2001) Fuzzy intrusion detection. In: IFSA world congress and 20th NAFIPS international conference, vol 9. No 3, pp 1506–1510
Zurück zum Zitat Gupta MM, Tsukamoto Y (1980) Fuzzy logic controllers—a perspective. In: Proceedings of the joint automatic control Conference, San Francisco, pp FA10-C Gupta MM, Tsukamoto Y (1980) Fuzzy logic controllers—a perspective. In: Proceedings of the joint automatic control Conference, San Francisco, pp FA10-C
Zurück zum Zitat Hu PZ, Heywood MI (2003) Predicting intrusions with local linear model. In: Proceedings of the international joint conference on neural networks, vol 3, pp 1780–1785 Hu PZ, Heywood MI (2003) Predicting intrusions with local linear model. In: Proceedings of the international joint conference on neural networks, vol 3, pp 1780–1785
Zurück zum Zitat Javitz HS, Valdes A, Denning DE, Neumann PG, (1986) Analytical techniques development for a statistical intrusion-detection system (SIDS) based on accounting records. Technical report, SRI International, Menlo Park Javitz HS, Valdes A, Denning DE, Neumann PG, (1986) Analytical techniques development for a statistical intrusion-detection system (SIDS) based on accounting records. Technical report, SRI International, Menlo Park
Zurück zum Zitat Kayacik HG, Zincir-Heywood AN, Heywood MI (2003) On the capability of an som based intrusion detection system. In: Proceedings of the international joint conference on neural networks, vol 3, pp 1808–1813 Kayacik HG, Zincir-Heywood AN, Heywood MI (2003) On the capability of an som based intrusion detection system. In: Proceedings of the international joint conference on neural networks, vol 3, pp 1808–1813
Zurück zum Zitat Lee CC (1990) Fuzzy logic in control system: fuzzy logic controller—Part I and Part II. IEEE Trans SMC 20:404–435MATH Lee CC (1990) Fuzzy logic in control system: fuzzy logic controller—Part I and Part II. IEEE Trans SMC 20:404–435MATH
Zurück zum Zitat Lee W, Salvatore J. Stolfo, Mok KW (1998) Mining audit data to build intrusion detection models. In: Proceedings of the fourth international conference on knowledge discovery and data mining (KDD 98), New York Lee W, Salvatore J. Stolfo, Mok KW (1998) Mining audit data to build intrusion detection models. In: Proceedings of the fourth international conference on knowledge discovery and data mining (KDD 98), New York
Zurück zum Zitat Lee W, Stolfo SJ (1998) Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio Lee W, Stolfo SJ (1998) Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio
Zurück zum Zitat Lei JZ, Ghorbani A (2004) Network intrusion detection using an improved competitive learning neural network. In: Proceedings of the second annual conference on communication networks and services research (CNSR04), pp 190–197 Lei JZ, Ghorbani A (2004) Network intrusion detection using an improved competitive learning neural network. In: Proceedings of the second annual conference on communication networks and services research (CNSR04), pp 190–197
Zurück zum Zitat Lippmann R, Fried D, Graf I, Haines J, Kendall K, McClung D, Weber D, Webster S, Wyschogrod D, Cunningham R, Zissman M (1998) Evaluating intrusion detection systems: 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of IEEE symposium on security and privacy, Oakland Lippmann R, Fried D, Graf I, Haines J, Kendall K, McClung D, Weber D, Webster S, Wyschogrod D, Cunningham R, Zissman M (1998) Evaluating intrusion detection systems: 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of IEEE symposium on security and privacy, Oakland
Zurück zum Zitat Mamdani EH (1974) Applications of fuzzy algorithms for simple dynamic plants. Proc IEE 121:1585–1588 Mamdani EH (1974) Applications of fuzzy algorithms for simple dynamic plants. Proc IEE 121:1585–1588
Zurück zum Zitat Mohajerani M, Moeini A, Kianie M (2003) NFIDS: a neuro-fuzzy intrusion detection system. In: Proceedings of the 10th IEEE international conference on electronics, circuits and systems, pp 348–351 Mohajerani M, Moeini A, Kianie M (2003) NFIDS: a neuro-fuzzy intrusion detection system. In: Proceedings of the 10th IEEE international conference on electronics, circuits and systems, pp 348–351
Zurück zum Zitat Mukkamala S , Sung AH, Abraham A (2003) Intrusion detection using ensemble of soft computing paradigms. In: The third international conference on intelligent systems design and applications, intelligent systems design and applications, advances in soft computing. Springer, Germany, pp 239–248 Mukkamala S , Sung AH, Abraham A (2003) Intrusion detection using ensemble of soft computing paradigms. In: The third international conference on intelligent systems design and applications, intelligent systems design and applications, advances in soft computing. Springer, Germany, pp 239–248
Zurück zum Zitat Mukkamala S, Sung AH, Abraham A (2004) Modeling intrusion detection systems using linear genetic programming approach. In: The 17th international conference on industrial & engineering applications of artificial intelligence and expert systems, innovations in applied artificial intelligence. In: Robert O.,Chunsheng Y., Moonis A., editors. Lecture Notes in Computer Science, vol 3029. Springer, Germany, pp 633–642 Mukkamala S, Sung AH, Abraham A (2004) Modeling intrusion detection systems using linear genetic programming approach. In: The 17th international conference on industrial & engineering applications of artificial intelligence and expert systems, innovations in applied artificial intelligence. In: Robert O.,Chunsheng Y., Moonis A., editors. Lecture Notes in Computer Science, vol 3029. Springer, Germany, pp 633–642
Zurück zum Zitat Mukherjee B, Herberlein LT, Levitt KN (1994) Network intrusion detection. IEEE Netw 8 Mukherjee B, Herberlein LT, Levitt KN (1994) Network intrusion detection. IEEE Netw 8
Zurück zum Zitat Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30:114–132CrossRef Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30:114–132CrossRef
Zurück zum Zitat Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS), National Institute of Standards and Technology Special Publication 800-94, 127 Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS), National Institute of Standards and Technology Special Publication 800-94, 127
Zurück zum Zitat Shah K, Dave N, Chavan S, Mukherjee S, Abraham A, Sanyal S (2004) Adaptive neuro-fuzzy intrusion detection system. In: IEEE international conference on information technology: coding and computing (ITCC04), vol 1. IEEE Computer Society, USA, pp 70–74 Shah K, Dave N, Chavan S, Mukherjee S, Abraham A, Sanyal S (2004) Adaptive neuro-fuzzy intrusion detection system. In: IEEE international conference on information technology: coding and computing (ITCC04), vol 1. IEEE Computer Society, USA, pp 70–74
Zurück zum Zitat Smaha SE (1988) Haystack: an intrusion detection system. In: Fourth aerospace computer security applications conference, Tracor Applied Science Inc., Austin, pp 37–44 Smaha SE (1988) Haystack: an intrusion detection system. In: Fourth aerospace computer security applications conference, Tracor Applied Science Inc., Austin, pp 37–44
Zurück zum Zitat Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15(1):116–132MATH Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15(1):116–132MATH
Zurück zum Zitat Vokorokos L, Balaz A, Chovanec M (2006) Intrusion detection system using self organizing map. Acta Electrotechnica et Informatica 6(1):6 Vokorokos L, Balaz A, Chovanec M (2006) Intrusion detection system using self organizing map. Acta Electrotechnica et Informatica 6(1):6
Zurück zum Zitat Wang WD, Bridges S (2000) Genetic algorithm optimization of membership functions for mining fuzzy association rules. In: Proceedings of the 7th international conference on fuzzy theory & technology, Atlantic City, pp 131–134 Wang WD, Bridges S (2000) Genetic algorithm optimization of membership functions for mining fuzzy association rules. In: Proceedings of the 7th international conference on fuzzy theory & technology, Atlantic City, pp 131–134
Zurück zum Zitat Wang Y, Chen H, Liu W (1996) A parallel algorithm for constructing a labeled tree. IEEE Trans Parallel and Distrib Syst 8:1236–1240CrossRef Wang Y, Chen H, Liu W (1996) A parallel algorithm for constructing a labeled tree. IEEE Trans Parallel and Distrib Syst 8:1236–1240CrossRef
Zurück zum Zitat Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M (eds) RAID 04: Proceedings of the 7th symposium on recent advances in intrusion detection. LNCS, vol 3224. Springer, Berlin, pp 203–222 Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M (eds) RAID 04: Proceedings of the 7th symposium on recent advances in intrusion detection. LNCS, vol 3224. Springer, Berlin, pp 203–222
Metadaten
Titel
Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems
verfasst von
Giovanni Acampora
Publikationsdatum
01.07.2012
Verlag
Springer-Verlag
Erschienen in
Soft Computing / Ausgabe 7/2012
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-011-0791-3

Weitere Artikel der Ausgabe 7/2012

Soft Computing 7/2012 Zur Ausgabe